Dimitrios Damopoulos
Dimitrios Damopoulos
Associate Professor Computer Science, University of South Alabama
Verified email at - Homepage
Cited by
Cited by
Introducing touchstroke: keystroke‐based authentication system for smartphones
G Kambourakis, D Damopoulos, D Papamartzivanos, E Pavlidakis
Security and Communication Networks 9 (6), 542-554, 2016
A critical review of 7 years of Mobile Device Forensics
K Barmpatsalou, D Damopoulos, G Kambourakis, V Katos
Digital Investigation 10 (4), 323-349, 2013
Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers
D Damopoulos, SA Menesidou, G Kambourakis, M Papadaki, N Clarke, ...
Security and Communication Networks 5 (1), 3-14, 2012
From keyloggers to touchloggers: Take the rough with the smooth
D Damopoulos, G Kambourakis, S Gritzalis
Computers & security 32, 102-114, 2013
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
D Damopoulos, G Kambourakis, G Portokalidis
Proceedings of the seventh european workshop on system security, 1-6, 2014
iSAM: an iPhone stealth airborne malware
D Damopoulos, G Kambourakis, S Gritzalis
IFIP International Information Security Conference, 17-28, 2011
A cloud-based architecture to crowdsource mobile app privacy leaks
D Papamartzivanos, D Damopoulos, G Kambourakis
Proceedings of the 18th panhellenic conference on informatics, 1-6, 2014
Exposing mobile malware from the inside (or what is your mobile app really doing?)
D Damopoulos, G Kambourakis, S Gritzalis, SO Park
Peer-to-Peer Networking and Applications 7 (4), 687-697, 2014
User privacy and modern mobile services: are they on the same path?
D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park
Personal and ubiquitous computing 17 (7), 1437-1448, 2013
Location-enhanced authentication using the IoT: Because you cannot be in two places at once
I Agadakos, P Hallgren, D Damopoulos, A Sabelfeld, G Portokalidis
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
MILC: A secure and privacy-preserving mobile instant locator with chatting
A Loukas, D Damopoulos, SA Menesidou, ME Skarkala, G Kambourakis, ...
Information Systems Frontiers 14 (3), 481-497, 2012
Hands-free one-time and continuous authentication using glass wearable devices
D Damopoulos, G Kambourakis
Journal of Information Security and Applications 46, 138-150, 2019
Let’s Meet! A participatory-based discovery and rendezvous mobile marketing framework
L Ntalkos, G Kambourakis, D Damopoulos
Telematics and Informatics 32 (4), 539-563, 2015
A competent post-authentication and non-repudiation biometric-based scheme for m-learning
G Kambourakis, D Damopoulos
Proceedings of the 10th IASTED International Conference on Web-based …, 2013
Europe in the shadow of financial crisis: Policy Making via Stance Classification
L Spiliotopoulou, D Damopoulos, Y Charalabidis, M Maragoudakis, ...
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
User-privacy and modern smartphones: A Siri(ous) dilemma
D Damopoulos, G Kambourakis, M Anagnostopoulos, S Gritzalis, JH Park
FTRA AIM 2012 International Conference on Advanced IT, 2012
Introducing research into the undergraduate curriculum in cybersecurity
D Damopoulos, S Wetzel
IFIP World Conference on Information Security Education, 30-42, 2019
Intrusion Detection and Prevention for Mobile Ecosystems
G Kambourakis, A Shabtai, C Kolias, D Damopoulos
CRC Press, 2017
WYSISNWIV: What You Scan Is Not What I Visit
Q Yang, D Damopoulos, G Portokalidis
International Symposium on Recent Advances in Intrusion Detection, 317-338, 2015
From fuzziness to criminal investigation: An inference system for Mobile Forensics
K Barmpatsalou, T Cruz, E Monteiro, P Simoes, G Kambourakis, ...
Intrusion Detection and Prevention for Mobile Ecosystems, 117-132, 2017
The system can't perform the operation now. Try again later.
Articles 1–20